CVE List

Id CVE No. Status Description Phase Votes Comments Actions
27773  CVE-2007-4416  Candidate  ** DISPUTED ** captcha.php in BellaBook (aka BellaBuffs) allows remote attackers to obtain administrative privileges by sending the admin"s username (admin_name) in a pheap_login cookie. NOTE: the vendor disputes this vulnerability because authentication data is derived from the admin_pass and secret variables, in addition to the admin_name; and because the exploit code is designed for an unrelated application.  Assigned (20070818)  None (candidate not yet proposed)    View
31584  CVE-2008-1467  Candidate  ** DISPUTED ** CenterIM 4.22.3 and earlier allows user-assisted remote attackers to execute arbitrary commands via shell metacharacters in a URI, related to "received URLs in the message window." NOTE: this issue has been disputed due to the user-assisted nature, since the URL must be selected and launched by the victim.  Assigned (20080324)  None (candidate not yet proposed)    View
6761  CVE-2002-2379  Candidate  ** DISPUTED ** Cisco AS5350 IOS 12.2(11)T with access control lists (ACLs) applied and possibly with ssh running allows remote attackers to cause a denial of service (crash) via a port scan, possibly due to an ssh bug. NOTE: this issue could not be reproduced by the vendor.  Assigned (20071031)  None (candidate not yet proposed)    View
26838  CVE-2007-3481  Candidate  ** DISPUTED ** Cross-domain vulnerability in Microsoft Internet Explorer 6 and 7 allows remote attackers to bypass the Same Origin Policy and access restricted information from other domains via JavaScript that overwrites the document variable and statically sets the document.domain attribute. NOTE: this issue has been disputed by other researchers, citing a variable scoping issue and information about the semantics of document.domain.  Assigned (20070628)  None (candidate not yet proposed)    View
19456  CVE-2006-3352  Candidate  ** DISPUTED ** Cross-domain vulnerability in Mozilla Firefox allows remote attackers to access restricted information from other domains via an object tag with a data parameter that references a link on the attacker"s originating site that specifies a Location HTTP header that references the target site, which then makes that content available through the outerHTML attribute of the object. NOTE: this description was based on a report that has since been retracted by the original authors. The authors misinterpreted their test results. Other third parties also disputed the original report. Therefore, this is not a vulnerability. It is being assigned a candidate number to provide a clear indication of its status.  Assigned (20060705)  None (candidate not yet proposed)    View

Page 11 of 20943, showing 5 records out of 104715 total, starting on record 51, ending on 55

<<first 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 last>>

Actions